Changes between Version 37 and Version 38 of GENIExperimenter/Tutorials/OpenFlowOVS-Floodlight/Execute
- Timestamp:
- 01/31/17 14:45:53 (7 years ago)
Legend:
- Unmodified
- Added
- Removed
- Modified
-
GENIExperimenter/Tutorials/OpenFlowOVS-Floodlight/Execute
v37 v38 166 166 }}} 167 167 168 When the Wireshark window pops up, you might still have to choose eth0 for a live capture. And you will want to use a filter to cut down on the chatter in the Wireshark window. One such filter might be to see what shows up on port 6653. To do that type ''' ''tcp.port eq 66 53'' ''' in the filter window, assuming that 6653 is the port that the controller is listening on. Once messages are captured, you can choose one, right click to "Decode as ...." and then choose ''OFP protocol'' to see its content.168 When the Wireshark window pops up, you might still have to choose eth0 for a live capture. And you will want to use a filter to cut down on the chatter in the Wireshark window. One such filter might be to see what shows up on port 6653. To do that type ''' ''tcp.port eq 6633'' ''' in the filter window, assuming that 6633 is the port that the controller is listening on. Once messages are captured, you can choose one, right click to "Decode as ...." and then choose ''OFP protocol'' to see its content. 169 169 170 170